Page 3 of 44 results (0.015 seconds)

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 0

Panasonic AiSEG2 versions 2.80F through 2.93A allows remote attackers to execute arbitrary OS commands. • https://www2.panasonic.biz/jp/densetsu/aiseg/firmup_info.html • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 8.8EPSS: 0%CPEs: 11EXPL: 0

Panasonic Sanyo CCTV Network Cameras versions 1.02-05 and 2.03-0x are vulnerable to CSRFs that can be exploited to allow an attacker to perform changes with administrator level privileges. Las cámaras de red Panasonic Sanyo CCTV en las versiones 1.02-05 y 2.03-0x son vulnerables a CSRF que pueden explotarse permitiendo que un atacante realice cambios con privilegios de nivel de administrador. • https://archives.connect.panasonic.com/security/sanyo/index.html https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-04 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

Panasonic FPWIN Pro, all Versions 7.5.1.1 and prior, allows an attacker to craft a project file specifying a URI that causes the XML parser to access the URI and embed the contents, which may allow the attacker to disclose information that is accessible in the context of the user executing software. Panasonic FPWIN Pro, todas las versiones 7.5.1.1 y anteriores, permite a un atacante diseñar un archivo de proyecto especificando un URI que causa al analizador XML acceder al URI e insertar el contenido, lo que puede permitir al atacante divulgar información que es accesible en el contexto del usuario que ejecuta el software • https://us-cert.cisa.gov/ics/advisories/icsa-21-180-03 • CWE-611: Improper Restriction of XML External Entity Reference •

CVSS: 10.0EPSS: 1%CPEs: 1EXPL: 0

Video Insight VMS versions prior to 7.8 allows a remote attacker to execute arbitrary code with the system user privilege by sending a specially crafted request. Video Insight VMS versiones anteriores a 7.8, permiten a un atacante remoto ejecutar código arbitrario con privilegios del usuario system mediante el envío de una petición especialmente diseñada • http://downloadvi.com/downloads/IPServer/v7.8/780182/v780182RN.pdf https://jvn.jp/en/jp/JVN42252698/index.html • CWE-319: Cleartext Transmission of Sensitive Information •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

FPWIN Pro is vulnerable to an out-of-bounds read vulnerability when a user opens a maliciously crafted project file, which may allow an attacker to remotely execute arbitrary code. FPWIN Pro es suceptible a una vulnerabilidad de lectura fuera de límites cuando un usuario abre un archivo de proyecto diseñado con fines maliciosos, lo que puede permitir a un atacante ejecutar código arbitrario remotamente This vulnerability allows remote attackers to execute arbitrary code on affected installations of Panasonic Control FPWIN Pro. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PRO files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. • https://us-cert.cisa.gov/ics/advisories/icsa-21-005-02 • CWE-125: Out-of-bounds Read •